Pretest css1
Pretest css1
PRETEST IN ICT 9
CSS - I
MULTIPLE CHOICE: Directions – Read each item very carefully. Encircle the letter that corresponds to the correct
answer.
1. This tool is used to check the integrity of the network cable
a. Hand tool b. Wire cutter c. LAN cable d. Crimping tool
2. With some interfaces we use, the latest out in the market that connects tv and laptop is:
a. VGA b. HDMI c. Power cable d. UTP
3. Apple MAC OS is co-founded by:
a. Steve Wozniak b. Mark Zuckerberg c. Bill Gates d. Larry Page
4. LAN stands for:
a. Land Area Network b. Land Arc Network c. Local Arc Network d. Local Area Network
5. The following below are examples of Basic tools in networking except for:
a. LAN tester b. LAN cable c. Pocket wifi d. RJ - 45
6. Which version of Windows fail to the market because of all its restrictions.
a. Windows 8 b. Windows 7 c. Windows XP d. Windows Vista
7. GNU stands for:
a. GUN not Unix b. GUI not Unix c. GUD not Unix d. GUO not Unix
8. The following are the popular Operating System available in the market today, except for:
a. Ubuntu b. Linux c. Windows d. eOS
9. How many levels of tree topology are designed to be able to call it tee topology?
a. Two b.. Four c. Three d. Five
10. Global Area Network are the networks being used by:
a. Astronaut b. Teacher c. Banker d. Student
11. This interface connects series of computers.
a. Bulk cable b. Router c. Power cable d. LAN
12. The classification of Networks that connect computers all over the country is:
a. LAN b. MAN c. GAN d. WAN
13. The version of Windows Vista was released this year. It is one of the prominent OS in the market at that time.
a. 2001 b. 2003 c. 2005 d. 2007
14. This is the type of network topology known for its fast performance.
a. Bus topology b. Star topology c. Hybrid topology d. Mesh topology
15. AVR is a device designed to regulate voltage automatically. It stands for:
a. Automatic Voltage Regulator c. Autographic Voltage Reassess
b. Automatic Voltage Reassess d. Autographics Voltage Regulator
16. This is the topology that combines two or more topology at once.
a. Network topology b. Star topology c. Hybrid topology d. Mesh topology
17. It is the classification of network where satellite communication is used.
a. LAN b. MAN c. GAN d. WAN
18. The logic of this network classification if designed for the use of computers within an area.
a. LAN b. MAN c. GAN d. WAN
19. It is the schematic description of a network arrangement that connects nodes.
a. Network topology b. Star topology c. Hybrid topology d. Mesh topology
20. All of the recent versions of MAC OS are known in the market. One version is LION released on:
a. 2009 b. 2011 c. 2013 d. 2015
21. It is a point-to-point connection to other nodes or devices.
a. Network topology b. Star topology c. Hybrid topology d. Mesh topology
22. He began the development of Linus Kernel and went to University of Helsinki
a. Torvalds b. Zuckerberg c.Jobs d. Wayne
23. This topology is a network connection in which every computer is connected to single cable.
a. Bus topology b. Ring topology c. Tree topology d. None
24. The person that shall establish the place of employment in accordance with the regulation of OHS.
a. Everybody b. employer c. employee d. business associate
25. The services of a competent full-time occupational health physician in the medical clinic spends atleast:
a. 8 hours a day b. 6 hours a dayc. 4 hours a day d. at least 2 hours a day
26. An examining table in the workplace is needed. The said table is called:
a. Normal bed b. Hospital bed c. Trendelenberg d. trendberg
27. An emergency treatment room shall be provided by the employer which has how many number of employee?
a. 1 to 50 b. 51-99 c. 99-150 d. 150-200
28. During the bad weather, ESD risk is increased. Try not to work on computer during__________?
a. Rainy days b. Daytime c. Night time d. Storms
29. The following are the potential conductor of the electro static, except:
a. Wool furry clothes b. Doorknob c. Handle of the knife d. Jewelries
30. This is the year of the invention of the router. a.1980 b. 1981 c. 1982 d. 1983
31. Wireless router has one or more standard, wire-based Ethernet port. One port is used to connect the router to a
broadband modem. Other Ethernet ports might be also available, allowing you to connect standard wire-based
networking. a,True b. False c. In some cases d. Never
32. This is the presidential decree about providing penalty for improper disposal of garbage and other forms of
uncleanliness. a.PD 824 b. PD 825 c. PD 826 d. PD 827
33. An unhealthy citizenry is a vital factor in bringing the reforms, specifically in terms of disposal of garbage. a.
True b. False c. In some cases d. Never
34. All garbage, filth and other waste matters shall be placed in the proper receptacles for the disposition of the: a.
Garbage collector b. LGUs c. Municipal Officers d. None
35. Any person who shall litter shall suffer an imprisonment of not less than five days nor more than:
a. 4 years b. 3 years c. 2 years d. 1 year
36. The Philippine Ecological Solid Waste Management of 2000 is also known as:
a. RA 9000 b. RA 9001 c. RA 9002 d. RA 9003
37. The Presidential Decree institutionalizes public participation in the development and implementation of national
and local integrated, comprehensive and ecological waste management programs.
a. True b. False c. In some cases d. Never
38. The world we live in is full of online distractions. Personal email, games and social media are all elements
contributing to a slump in: a.Internet surfing b. All of the above
c.Workplace productivity d. None of the above
39. These can help address a number of real problems that are costing businesses thousands of dollars in lost
productivity every day. A.effective computer policy b. sensible monitoring tools
c.Network usage policy d. Functional computer networks
40. Businesses of all shapes and sizes have been caught off guard by these, except:
a. Electronic mail b. gaming c. Social networking sites d. task at work
41. It introduces infrastructure and security concerns. The sites used for software and media piracy often leave
visitors with malware, viruses and spyware, which can compromise private business data and affect the proper
functioning of your machines
a. Virus utility b. peer to peer technologies c.Facebook d. piracy
42. Peer-to-Peer technologies can be used to download illegal files, including copyright protected material which is
punishable under various federal laws.
a. Virus utility b. peer to peer technologies c. Facebook d. piracy
43. Having a computer use policy is a great way to emphasize and reinforce to the employee that the computer is a
business tool and should be used in that manner
a. True b. False c. In some cases d. Never
44. Reducing the amount of waste by increasing the efficiency of resource used and extending the useful life of
products. a.Refuse b. Reduce c. Reuse d. Recycle
45. Using the recyclable resources from used items again, as products or parts, after giving them proper treatment.
a. Refuse b. Reduce c. Reuse d. Recycle
46. Using the resources as the raw materials to make new products.
a. Refuse b. Reduce c. Reuse d. Recycle
47. Even if an employer is unaware of illegal activity, they may still be held responsible for their actions.
a. Blanket statement b. violation policy c. Zero tolerance d. None of the above
48. The Republic Act on Waste Management ensures proper segregation, transport and the like as well as the
adoption of the best environmental practices in ecological waste management excluding:
a. Incineration b. Incenuration c. Ingeneration d. Inginuration
Checked by: MINA L. LIM – HT III (TLE) Noted: MARY FINELA M. BAYAN, Ph.D. – Principal IV